Browse by Tags

In the first entry in this series (to view, follow this link), I took a look at the how row level security worked with read operations. Now in this entry, I want to expand that to how you use it to limit what a user might write to, or delete from a table.
To recap our current situation, we have three users:
CREATE USER BigHat WITHOUT ...

This is part 1 of my Row Level Security blogs for my upcoming book project.
Row Level Security is a very interesting feature. Unlike Dynamic Data Masking (link), which looks interesting on it's face, once you dig in the utilization of the feature looks to be limited by how granular you can make the security work. Row Level Security on the other ...

This is part 2 of my Dynamic Data Masking blogs for my upcoming book project. Part 1 is here: Dynamic Data Masking - Part 1 - The Mechanism.
Previously, in my first blog on Dynamic Data Masking - Part 1 - The Mechanisms, we had created the following table (I include this so you can see the DDL of creating the table with the MASKED WITH clause on ...